Documents stored in Office 365 are easily shared, both internally and externally. This presents some potential threats and consequences of exposing documents to unauthorized users through the cloud sharing platform. When documents that contain personally identifiable information (PII), protected healthcare... Read More

This Sunday, July 26, 2015, marks the 25th Anniversary of the Americans with Disabilities Act. On that day, I’ll be flying back from Washington, DC after attending a celebration of the ADA anniversary with my friends and former colleagues from... Read More

Last month, Fortune published an eye-opening expose on the massive cyber attack that hit Sony Pictures Entertainment in November 2014. The blog series is full of lurid details on studio politics, but it’s also fascinating for the insights it offers... Read More

Security risks to government come in many forms these days – it could be the person sitting in their basement seeking network access to break your security or another government. The reality is it doesn’t take a whole lot to... Read More

Today we are excited to announce the promotion of Kurt Glazemakers from SVP of Product Strategy to Chief Technology Officer (CTO). He will be directly responsible for defining the strategy and roadmap for the next generation of Cryptzone’s award-wining portfolio... Read More

Fortune recently published a three-part article series on the apparently state-sponsored cyber attack that brought Sony Pictures Entertainment to its knees in November 2014. It’s a great read – see parts one, two and three – for more than a... Read More

According to a recent Cryptzone survey conducted with TechValidate, 90% of companies are using aging VPN technology for network access control. That’s a flawed model that no longer works in the era of the cloud, BYOD and the Internet of... Read More

Almost half a year has passed since PCI DSS 3.0 came into effect, bringing with it a raft of new regulatory requirements for organizations that store and process payment card data. Many of those mandates were introduced to address one... Read More

Major League baseball personnel from the St. Louis Cardinals borrowed a tried and true attack vector to hack into the Houston Astros application called Ground Control. One difference with typical attacks that emanate from stolen credentials was that the Cardinal... Read More